FantasticSearch

Scroll to: TopResults

Explore European Union Legislation by Asking a Legal Question

assisted-checkbox

filter-instruction-1
positive-filters
negative-filters
act-filter tabs-all

parameters-title

query

assisted-checkbox:

result-title

total 2

Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act) (Text with EEA relevance)

article  51

CELEX:  02019R0881-20250204

Security objectives of European cybersecurity certification schemes for ICT products, ICT services and ICT processes A European cybersecurity certification scheme for ICT products, ICT services or ICT processes shall be designed to achieve, as applicable, at least the following security objectives:
(a) to protect stored, transmitted or otherwise processed data against accidental or unauthorised storage, processing, access or disclosure during the entire life cycle of the ICT product, ICT service or ICT process;
(b) to protect stored, transmitted or otherwise processed data against accidental or unauthorised destruction, loss or alteration or lack of availability during the entire life cycle of the ICT product, ICT service or ICT process;
(c) that authorised persons, programs or machines are able only to access the data, services or functions to which their access rights refer;
(d) to identify and document known dependencies and vulnerabilities;
(e) to record which data, services or functions have been accessed, used or otherwise processed, at what times and by whom;
Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act) (Text with EEA relevance)

article  51

CELEX:  02019R0881-20250204

(f) to make it possible to check which data, services or functions have been accessed, used or otherwise processed, at what times and by whom;
(g) to verify that ICT products, ICT services and ICT processes do not contain known vulnerabilities;
(h) to restore the availability and access to data, services and functions in a timely manner in the event of a physical or technical incident;
(i) that ICT products, ICT services and ICT processes are secure by default and by design;
(j) that ICT products, ICT services and ICT processes are provided with up-to-date software and hardware that do not contain publicly known vulnerabilities, and are provided with mechanisms for secure updates.